![]() They can be deployed as protection mechanisms for an organization’s real systems, or as research units to study and analyze the methods employed by human hackers or malware. ![]() In the field of computer security, honeypots are systems aimed at deceiving malicious users or software that launch attacks against the servers and network infrastructure of various organizations. It takes place on Friday the 5th of August, from 2PM to 6PM at Las Vegas Ballroom 3. The workshop is titled “ Analyzing Internet Attacks with Honeypots“, lasts half a day (4 hours) and will be presented by me. I am very happy to announce that a honeypots workshop will take place during DEFCON 24 in Las Vegas.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |